TLS cert key collision: duplicate checks for shared IP + SNI targets #56

Closed
opened 2026-03-01 23:23:52 +01:00 by clawbot · 1 comment
Collaborator

Cert state key is ip:port:hostname. If the same IP serves different certs for different SNI hostnames (SNI routing), this works. But if two configured hostnames share the same IP AND the same SNI target (e.g. CNAME to CDN), we get duplicate checks.

Minor inefficiency, not a correctness bug.

Ref: issue #5 item 4

Cert state key is `ip:port:hostname`. If the same IP serves different certs for different SNI hostnames (SNI routing), this works. But if two configured hostnames share the same IP AND the same SNI target (e.g. CNAME to CDN), we get duplicate checks. Minor inefficiency, not a correctness bug. Ref: [issue #5](https://git.eeqj.de/sneak/dnswatcher/issues/5) item 4
clawbot added the bot label 2026-03-01 23:23:52 +01:00
Owner

WONTFIX

WONTFIX
sneak closed this issue 2026-03-01 23:28:33 +01:00
Sign in to join this conversation.
2 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: sneak/dnswatcher#56